unode / firefox_decrypt
Firefox Decrypt is a tool to extract passwords from Mozilla (Firefox™, Waterfox™, Thunderbird®, SeaMonkey®) profiles
☆2,090Updated 2 months ago
Alternatives and similar repositories for firefox_decrypt:
Users that are interested in firefox_decrypt are comparing it to the libraries listed below
- firepwd.py, an open source tool to decrypt Mozilla protected passwords☆623Updated 3 years ago
- Mimikatz implementation in pure Python☆2,937Updated 3 weeks ago
- SMBMap is a handy SMB enumeration tool☆1,828Updated this week
- Privilege Escalation Project - Windows / Linux / Mac☆2,471Updated 3 months ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆2,053Updated 3 months ago
- Crowbar is brute forcing tool that can be used during penetration tests. It is developed to support protocols that are not currently supp…☆1,399Updated last year
- Patator is a multi-purpose brute-forcer, with a modular design and a flexible usage.☆3,626Updated 3 months ago
- A next generation version of enum4linux (a Windows/Samba enumeration tool) with additional features like JSON/YAML export. Aimed for secu…☆1,230Updated 5 months ago
- pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and …☆1,814Updated 2 years ago
- CeWL is a Custom Word List Generator☆2,054Updated 2 months ago
- A tool to perform Kerberos pre-auth bruteforcing☆2,749Updated 5 months ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆5,596Updated 3 months ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆2,141Updated last year
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆1,697Updated 2 months ago
- DNS Enumeration Script☆2,689Updated this week
- pwning IPv4 via IPv6☆1,749Updated 11 months ago
- The ultimate WinRM shell for hacking/pentesting☆4,665Updated last month
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆5,112Updated 2 months ago
- CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based S…☆1,575Updated 4 years ago
- 🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 300+ other hashes ☄ Comes wi…☆1,518Updated last year
- Monitor linux processes without root permissions☆5,062Updated 2 years ago
- Extract credentials from lsass remotely☆2,080Updated 3 weeks ago
- Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.☆4,349Updated last week
- Windows Exploit Suggester - Next Generation☆4,291Updated this week
- Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's po…☆3,773Updated 11 months ago
- Chimera is a PowerShell obfuscation script designed to bypass AMSI and commercial antivirus solutions.☆1,469Updated 3 years ago
- Mentalist is a graphical tool for custom wordlist generation. It utilizes common human paradigms for constructing passwords and can outpu…☆1,829Updated last year
- A tool to dump a git repository from a website☆1,949Updated last month
- Network recon framework. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run yo…☆3,599Updated last week
- Find web directories without bruteforce☆1,790Updated last year